Action1, the Superior Choice for IT Security Patch Management

As cyber threats grow, timely patch management is vital. Action1, certified with ISO 27001 and SOC 2 Type II, provides top-tier security, making it the best choice for organisations that seeks flexibility and a cost effective solution. Here is why our customers prefer using Action1. … “Action1, the Superior Choice for IT Security Patch Management”

Read More

Simplifying Patch Management for a Secure and Compliant Future

In today’s rapidly evolving digital landscape, maintaining robust IT security is paramount. Managing security patches efficiently and effectively can be a daunting task, especially as vulnerabilities and threats continue to emerge at an alarming rate. However, there’s a solution that simplifies this process, enabling IT … “Simplifying Patch Management for a Secure and Compliant Future”

Read More

Windows SMB2 'SRV2.SYS' Remote Denial of Service Exploit (and screen shots on Windows 2008 SP2)

There’s a simple exploit code on SMB2 protocol (implemented in the newer OSes of Microsoft) that can easily remote BSDO a Windows server or client. SRV2.SYS fails to handle malformed SMB headers for the NEGOTIATE PROTOCOL REQUEST functionality. The NEGOTIATE PROTOCOL REQUEST is the first … “Windows SMB2 'SRV2.SYS' Remote Denial of Service Exploit (and screen shots on Windows 2008 SP2)”

Read More

My views on free VS. premiere security products.. and Microsoft’s Antivirus?

It’s interesting how one AV product suppress the other in just a matter of months. Look at the graphs produced by those so called independent testers. A sample here. Its a big war of AV companies out there. My problem is, it’s sickening to know … “My views on free VS. premiere security products.. and Microsoft’s Antivirus?”

Read More

Possible new breed of mass spreading worms ? New vulnerabilities found in MS products.

Microsoft Office OWC10.Spreadsheet ActiveX BorderAround() Heap Corruption Vulnerability The specific vulnerability exists in the OWC10.Spreadsheet.10 ActiveX control installed by Microsoft Office. By accessing specific methods in a certain order heap corruption occurs leading to remote code execution. If exploited, complete control of the affected system … “Possible new breed of mass spreading worms ? New vulnerabilities found in MS products.”

Read More